1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
9

You are trying to determine why a packet of data is not being correctly sent over the internet. You determine that the problem i

s that they are being labeled with the incorrect IP address. Which layer of the protocol stack is the most likely problem?
IP

application

TCP

hardware
Computers and Technology
2 answers:
spayn [35]3 years ago
6 0
Answer is A it has a false ip so that is why an error is happening therefore the answer would be A.
Mice21 [21]3 years ago
5 0
It is A because it is a false up acres
You might be interested in
Types of computer that we use in our daily life​
ozzi

Answer:

all coumputers

Explanation:

i just like coumputers

5 0
3 years ago
Read 2 more answers
you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid
Genrish500 [490]

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

7 0
3 years ago
What is the answer to 7.4.4: Length of User's Name codehs
Alik [6]

The program that ask the user to type there first name and then print out how many letters that is in there name is as follows:

x = input("what is your first name: ")

y = len(x)

print(f"There are {y} letters in your name")

<h3>Code explanation;</h3>

The code is written in python.

  • Firstly, we store the users name in the variable x.
  • Then, we find the length of the users inputted name and store it in a variable y.
  • Finally, we print the length of the users name using the print function.

learn more on python here: brainly.com/question/26738945

4 0
2 years ago
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
The line of code after a line beginning with the word 'else' needs to begin with a(n) ___.
Julli [10]
The answer to your question is D
7 0
2 years ago
Other questions:
  • A_____refers to the entire Excel file
    14·1 answer
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is present
    10·2 answers
  • Eight houses represented as cells are arranged in a straight line java int state []
    14·1 answer
  • Match each word to its correct meaning.
    7·1 answer
  • What type of version of visual studio is the visual studio express
    8·1 answer
  • Which computer was part of the first generation of computers?
    14·2 answers
  • Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
    8·1 answer
  • Borrowing money affects both assests and owners equity. True or false?​
    13·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!